Drive-by download campaign targets Chinese websites, experiments with exploits

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.
Categories:

Threat analysis

Tags: Chinesecoinhivedrive-byEKexploit kitexploitsFlash PlayerInternet Explorersvchost.exe… Continue reading Drive-by download campaign targets Chinese websites, experiments with exploits

Drive-by download campaign targets Chinese websites, experiments with exploits

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.
Categories:

Threat analysis

Tags: Chinesecoinhivedrive-byEKexploit kitexploitsFlash PlayerInternet Explorersvchost.exe… Continue reading Drive-by download campaign targets Chinese websites, experiments with exploits

Encryption 101: a malware analyst’s primer

A primer on encryption mechanisms and how they are exploited by malware authors, including an introduction to encryption and the main methods used to encrypt ransomware.
Categories:

Threat analysis

Tags: 101encryptionransomware

(Read more…… Continue reading Encryption 101: a malware analyst’s primer

Drive-by cryptomining campaign targets millions of Android users

Android users have been exposed to drive-by cryptomining in one of the largest campaigns that we have detected so far.
Categories:

Threat analysis

Tags: AndroidBotCAPTCHAcoinhivecrypto miningcryptominingdrive-by

(Read more…)

The post… Continue reading Drive-by cryptomining campaign targets millions of Android users

New Mac cryptominer distributed via a MacUpdate hack

A new Mac cryptocurrency miner, called OSX.CreativeUpdate, was being distributed from the MacUpdate website, in the guise of known apps such as Firefox.
Categories:

Mac
Threat analysis

Tags: cryptominercryptominingmacmac malwareMacUpdatePlatypu… Continue reading New Mac cryptominer distributed via a MacUpdate hack

Scarab ransomware: new variant changes tactics

We’ve found that a variant of the Scarab ransomware, called Scarabey, is distributed via a different technique, with a different payload code, and a new target: Russia.
Scarabey, like most ransomware, is designed to demand a Bitcoin payment from i… Continue reading Scarab ransomware: new variant changes tactics

Scarab ransomware: new variant changes tactics

We’ve found that a variant of the Scarab ransomware, called Scarabey, is distributed via a different technique, with a different payload code, and a new target: Russia.
Scarabey, like most ransomware, is designed to demand a Bitcoin payment from i… Continue reading Scarab ransomware: new variant changes tactics

GandCrab ransomware distributed by RIG and GrandSoft exploit kits

Ransomware may have slowed its growth but is still a go-to payload for threat actors looking to monetize drive-by download attacks. The latest attempt: GandCrab ransomware.
Categories:

Exploits
Threat analysis

Tags: exploit kitsgandcrabgandcrab… Continue reading GandCrab ransomware distributed by RIG and GrandSoft exploit kits

New Chrome and Firefox extensions block their removal to hijack browsers

Two new extensions in Firefox and Chrome force install then hide from the user. Learn how you can protect yourself against them and remove them manually.
Categories:

Malware
Threat analysis

Tags: blockedchromeextensionsfirefoxnormal removalPiet… Continue reading New Chrome and Firefox extensions block their removal to hijack browsers

A coin miner with a “Heaven’s Gate”

The Heaven’s Gate technique has been around since 2009. But now coin miners are using it to maximize their performance in the target architecture.
Categories:

Malware
Threat analysis

Tags: coin minersHeaven’s Gatemalware analysis

(Read more…. Continue reading A coin miner with a “Heaven’s Gate”